Files
metasploit-gs/modules
Valentin Lobstein 005fbb17a1 Address PR #20768 review feedback
- Fix machineKey extraction regex to handle decryption attribute
- Replace Base64.strict_encode64 with Rex::Text.encode_base64
- Add READ_FILE and EXTRACT_MACHINEKEY actions
- Add PRODUCT option for CentreStack/Triofox support
- Use different storage endpoints per product type
- Update documentation with new options and actions
2026-02-04 08:38:35 +01:00
..
2025-11-23 17:22:32 +11:00

This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for Metasploit's various payloads (which are also modules), and post for post exploitation modules.